* website: Bump prettier from 3.3.3 to 3.4.1 in /website Bumps [prettier](https://github.com/prettier/prettier) from 3.3.3 to 3.4.1. - [Release notes](https://github.com/prettier/prettier/releases) - [Changelog](https://github.com/prettier/prettier/blob/main/CHANGELOG.md) - [Commits](https://github.com/prettier/prettier/compare/3.3.3...3.4.1) --- updated-dependencies: - dependency-name: prettier dependency-type: direct:development update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> * update formatting Signed-off-by: Jens Langhammer <jens@goauthentik.io> * sigh Signed-off-by: Jens Langhammer <jens@goauthentik.io> * disable flaky test Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Jens Langhammer <jens@goauthentik.io>
2.2 KiB
2.2 KiB
title, sidebar_label
| title | sidebar_label |
|---|---|
| Integrate with Zammad | Zammad |
Zammad
Support level: Community
What is Zammad
Zammad is a web-based, open source user support/ticketing solution. Download and install it on your own servers. For free.
Preparation
The following placeholders will be used:
zammad.companyis the FQDN of the zammad install.authentik.companyis the FQDN of the authentik install.
authentik Configuration
Step 1 - Property Mappings
Create two Mappings (under Customization/Property Mappings) with these settings:
name mapping
- Name: Zammad SAML Mapping: name
- SAML Attribute Name: name
- Friendly Name: none
- Expression:
return request.user.name
email mapping
- Name: Zammad SAML Mapping: email
- SAML Attribute Name: email
- Friendly Name: none
- Expression:
return request.user.email
Step 2 - SAML Provider
In authentik, create a SAML Provider (under Applications/Providers) with these settings :
- Name : zammad
- ACS URL:
https://zammad.company/auth/saml/callback - Issuer:
https://zammad.company/auth/saml/metadata - Service Provider Binding: Post
- Audience:
https://zammad.company/auth/saml/metadata - Property mappings: Zammad SAML Mapping: name & Zammad SAML Mapping: email
- NameID Property Mapping: Zammad SAML Mapping: name
Step 3 - Application
In authentik, create an application (under Resources/Applications) with these settings :
- Name: Zammad
- Slug: zammad
- Provider: zammad
zammad Setup
Configure Zammad SAML settings by going to settings (the gear icon), and selecting Security -> Third-party Applications and activate Authentication via SAML and change the following fields:
- Display name: authentik
- IDP SSO target URL: https://authentik.company/application/saml/zammad/sso/binding/init/
- IDP single logout target URL: https://zammad.company/auth/saml/slo
- IDP certificate: ----BEGIN CERTIFICATE---- …
- IDP certificate fingerprint: empty
- Name Identifier Format: empty